[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
X86 dispatch contention vulnerability
- Subject: X86 dispatch contention vulnerability
- From: juan.g71 at gmail.com (juan)
- Date: Wed, 14 Nov 2018 16:52:15 -0300
- In-reply-to: <[email protected]>
- References: <CAO7N=i3qU-5nX+KKaMjKWpq7SHAJY9o--hFeiFmm1mVvcH0QMw@mail.gmail.com> <[email protected]> <CAO7N=i0NuhBSV2dCZQF_hVO5KE_40K3VK_gV-MZAm445tQPh2w@mail.gmail.com> <[email protected]>
On Wed, 14 Nov 2018 19:00:52 +0000 (UTC)
jim bell <jdb10987 at yahoo.com> wrote:
Â
> My company, SemiDisk Systems, was very close to the first disk emulator for a number of types of PC, including the S-100, TRS-80 Model II, IBM PC, Epson Q-10.https://www.pcworld.com/article/246617/storage/evolution-of-the-solid-state-drive.html
IIRC you also worked for intel designing memory chips? Excuse my rather naive question but...Did you see/hear at that time any hints that chips were being tampered with or somehow backdooored because of 'national security'?